The response to British Airways' data breach could help set new social norms for what is acceptable.
Patient information dumped on the side of the road in Brisbane recently has raised the issue of how hospitals and clinics manage their old paper records.
The government can access your phone metadata, drivers licence photo and much more. And new research shows Australians are OK about it. But that might change.
We found hundreds of local council workers willing to give out login details for government systems without realising.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
Medical practices have special requirements under the Privacy Act, but the security and privacy systems some providers currently have in place may be inadequate.
Preventing problems like Meltdown and Spectre from reocurring requires software developers to be given sufficient information about hardware to ensure security.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
The Productivity Commission’s report on data availability and use is disappointing for consumers, who won't be able to stop firms collecting their data or challenge automated decisions made using it.
You can never be entirely protected from data breaches, but understanding your data is the first step to minimising the risk.
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
There are many ways data can leak from organisations, and as long as companies leave it up to IT to solve, leaks will continue.